Network Security Services (NSS) 184.108.40.206 is a patch release for NSS 3.16, based on the NSS 3.16.2 release. The bug fixes in NSS 220.127.116.11 are described in the "Bugs Fixed" section below.
The HG tag is NSS_3_16_2_1_RTM. NSS 18.104.22.168 requires NSPR 4.10.6 or newer.
NSS 22.214.171.124 source distributions are also available on ftp.mozilla.org for secure HTTPS download:
- Source tarballs:
The following security-relevant bugs have been resolved in NSS 126.96.36.199. Users are encouraged to upgrade immediately.
New in NSS 188.8.131.52
No new functionality is introduced in this release. This is a patch release to fix a bug that caused NSS to accept forged RSA signatures.
A new symbol, _SGN_VerifyPKCS1DigestInfo is exported in this release. As with all exported NSS symbols that have a leading underscore '_', this is an internal symbol for NSS use only. Applications that use or depend on these symbols can and will break in future NSS releases.
Bugs fixed in NSS 184.108.40.206
- Bug 1064636 - (CVE-2014-1568) RSA Signature Forgery in NSS
The NSS development team would like to thank Antoine Delignat-Lavaud, security researcher at Inria Paris in team Prosecco, and the Advanced Threat Research team at Intel Security, who both independently discovered and reported this issue, for responsibly disclosing the issue by providing advance copies of their research.
NSS 220.127.116.11 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 18.104.22.168 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).